InOSINT TeambyVikas ChauhanDetect APT Group with Wazuh Part Two | APT UNC4841Global Exploitation of Barracuda ESG and the Lessons in Cybersecurity Resilience2d ago
InPosts By SpecterOps Team MembersbyLuke PaineTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
Dion AlexanderWuzuh (SIEM) & Atomic Red Team — Detection Engineering LabWazuh (SIEM) & Atomic Red Team Detection Engineering LabDec 3Dec 3
InInfoSec Write-upsbyRyan G. Cox - The Cybersec CaféWhat Makes a “Good” Detection?Whether you’re a seasoned Detection Engineer or just starting to build out your SIEM, there comes a point where you need to ask yourself…Dec 5Dec 5
DylanUtilizing Generative AI and LLMs to Automate Detection WritingIn Security Operations, we are primarily responsible for two things: Detection & Response. Writing detections can be a very laborious and…May 102May 102
InOSINT TeambyVikas ChauhanDetect APT Group with Wazuh Part Two | APT UNC4841Global Exploitation of Barracuda ESG and the Lessons in Cybersecurity Resilience2d ago
InPosts By SpecterOps Team MembersbyLuke PaineTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301
Dion AlexanderWuzuh (SIEM) & Atomic Red Team — Detection Engineering LabWazuh (SIEM) & Atomic Red Team Detection Engineering LabDec 3
InInfoSec Write-upsbyRyan G. Cox - The Cybersec CaféWhat Makes a “Good” Detection?Whether you’re a seasoned Detection Engineer or just starting to build out your SIEM, there comes a point where you need to ask yourself…Dec 5
DylanUtilizing Generative AI and LLMs to Automate Detection WritingIn Security Operations, we are primarily responsible for two things: Detection & Response. Writing detections can be a very laborious and…May 102
InGrumpy Goose LabsbyJimHold Me Closer, TinyPilotKVM-over-IP devices can allow anyone access into your environment.Aug 17
InDetect FYIbyKoifsecImmutable Artifacts — Enabling RDP ConnectionsBuilding on my previous article, in this article we will adopt the “Immutable Artifacts” methodology to detect such artifacts for…Dec 2